article thumbnail

Architect defense-in-depth security for generative AI applications using the OWASP Top 10 for LLMs

AWS Machine Learning - AI

You can use Amazon Inspector to automate vulnerability discovery and management for Amazon Elastic Compute Cloud (Amazon EC2) instances, containers, AWS Lambda functions, and identify the network reachability of your workloads. Understand the risks and benefits of using sensitive data in your models and inferencing.

article thumbnail

Radar trends to watch: May 2022

O'Reilly Media - Ideas

Lambda Function URLs automate the configuration of an API endpoint for single-function microservices on AWS. The NSA, Department of Energy, and other federal agencies have discovered a new malware toolkit named “pipedream” that is designed to disable power infrastructure. The malware targets WatchGuard firewalls and Asus routers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Radar trends to watch: July 2021

O'Reilly Media - Ideas

Microsoft is stressing biometrics (which have their own problems) and multi-factor authentication. The malware somehow slipped through Microsoft’s signing process. Authentication using gestures, hand shapes, and geometric deep learning ? Supply chain security is very problematic. It is also a Very Bad Idea.

Trends 127
article thumbnail

Radar Trends to Watch: August 2022

O'Reilly Media - Ideas

AWS is offering some customers a free multi factor authentication (MFA) security key. A system is installed; the default password is changed; the person who changed the password leaves; the password is lost; the company installs password recovery software, which is often malware-infested, to recover the password.